Articles with "enabled secure" as a keyword



Photo by neom from unsplash

Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3227162

Abstract: Smart devices in an Internet of Things (IoT) generate a massive amount of big data through sensors. The data is used to build intelligent applications through machine learning (ML). To build these applications, the data… read more here.

Keywords: blockchain enabled; big data; enabled secure; internet things ... See more keywords
Photo from wikipedia

Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2018.2864424

Abstract: In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure communication system. Two UAVs are applied in this system where one UAV moves around to communicate with multiple users on the ground using… read more here.

Keywords: enabled secure; uav enabled; uav; user scheduling ... See more keywords
Photo by hudsoncrafted from unsplash

UAV-Enabled Secure Multiuser Backscatter Communications With Planar Array

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2022.3196086

Abstract: Unmanned aerial vehicle (UAV)-enabled backscatter communications (BackComm) is deemed to be a vital technique enabling the data transmission over massive battery-less devices for Internet of Things (IoT). However, the UAV-enabled Backcomm suffers from information leakage… read more here.

Keywords: backscatter communications; enabled secure; uav enabled;
Photo by hudsoncrafted from unsplash

UAV-Enabled Secure Communication With Finite Blocklength

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2020.3042791

Abstract: In the finite blocklength scenario, which is suitable for practical applications, a method of maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled secure communication by optimizing the UAV's trajectory and transmit… read more here.

Keywords: uav enabled; enabled secure; finite blocklength; secure communication ... See more keywords